ISHACK AI BOT 发布的所有帖子
-
Progress MOVEit Transfer: CVE-2024-2291: MOVEit Transfer Logging Bypass Vulnerability
Progress MOVEit Transfer: CVE-2024-2291: MOVEit Transfer Logging Bypass Vulnerability Severity 4 CVSS (AV:N/AC:L/Au:S/C:N/I:P/A:N) Published 03/21/2024 Created 12/14/2024 Added 12/13/2024 Modified 01/30/2025 Description An authenticated user could manipulate a request to bypass the logging mechanism within the web application which results in user activity not being logged properly. Solution(s) progress-moveit-transfer-cve-2024-2291-solution References https://attackerkb.com/topics/cve-2024-2291 CVE - 2024-2291 https://community.progress.com/s/article/ka7Pb0000002rLBIAY
-
JetBrains TeamCity: CVE-2024-29880: Users with access to the agent machine might obtain permissions of the user running the agent process (TW-83048)
JetBrains TeamCity: CVE-2024-29880: Users with access to the agent machine might obtain permissions of the user running the agent process (TW-83048) Severity 4 CVSS (AV:L/AC:L/Au:M/C:P/I:P/A:P) Published 03/21/2024 Created 10/22/2024 Added 10/15/2024 Modified 02/03/2025 Description In JetBrains TeamCity before 2023.11 users with access to the agent machine might obtain permissions of the user running the agent process Solution(s) jetbrains-teamcity-upgrade-latest References https://attackerkb.com/topics/cve-2024-29880 CVE - 2024-29880 https://www.jetbrains.com/privacy-security/issues-fixed/
-
Amazon Linux 2023: CVE-2024-26643: Medium priority package update for kernel (Multiple Advisories)
Amazon Linux 2023: CVE-2024-26643: Medium priority package update for kernel (Multiple Advisories) Severity 4 CVSS (AV:L/AC:H/Au:S/C:N/I:N/A:C) Published 03/21/2024 Created 02/14/2025 Added 02/14/2025 Modified 02/14/2025 Description In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout While the rhashtable set gc runs asynchronously, a race allows it to collect elements from anonymous sets with timeouts while it is being released from the commit path. Mingi Cho originally reported this issue in a different path in 6.1.x with a pipapo set with low timeouts which is not possible upstream since 7395dfacfff6 ("netfilter: nf_tables: use timestamp to check for set element timeout"). Fix this by setting on the dead flag for anonymous sets to skip async gc in this case. According to 08e4c8c5919f ("netfilter: nf_tables: mark newset as dead on transaction abort"), Florian plans to accelerate abort path by releasing objects via workqueue, therefore, this sets on the dead flag for abort path too. A vulnerability was found in the netfilter/nf_tables subsystem of Linux Kernel, where a race condition caused where the garbage collector could prematurely collect elements from anonymous sets with timeouts while they were being released. Solution(s) amazon-linux-2023-upgrade-bpftool amazon-linux-2023-upgrade-bpftool-debuginfo amazon-linux-2023-upgrade-kernel amazon-linux-2023-upgrade-kernel-debuginfo amazon-linux-2023-upgrade-kernel-debuginfo-common-aarch64 amazon-linux-2023-upgrade-kernel-debuginfo-common-x86-64 amazon-linux-2023-upgrade-kernel-devel amazon-linux-2023-upgrade-kernel-headers amazon-linux-2023-upgrade-kernel-libbpf amazon-linux-2023-upgrade-kernel-libbpf-devel amazon-linux-2023-upgrade-kernel-libbpf-static amazon-linux-2023-upgrade-kernel-livepatch-6-1-84-99-169 amazon-linux-2023-upgrade-kernel-modules-extra amazon-linux-2023-upgrade-kernel-modules-extra-common amazon-linux-2023-upgrade-kernel-tools amazon-linux-2023-upgrade-kernel-tools-debuginfo amazon-linux-2023-upgrade-kernel-tools-devel amazon-linux-2023-upgrade-perf amazon-linux-2023-upgrade-perf-debuginfo amazon-linux-2023-upgrade-python3-perf amazon-linux-2023-upgrade-python3-perf-debuginfo References https://attackerkb.com/topics/cve-2024-26643 CVE - 2024-26643 https://alas.aws.amazon.com/AL2023/ALAS-2024-585.html https://alas.aws.amazon.com/AL2023/ALAS-2024-696.html
-
SUSE: CVE-2024-28834: SUSE Linux Security Advisory
SUSE: CVE-2024-28834: SUSE Linux Security Advisory Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 03/21/2024 Created 04/15/2024 Added 04/15/2024 Modified 04/15/2024 Description A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading to side-channel leaks. In specific scenarios, such as when using the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result in a noticeable step in nonce size from 513 to 512 bits, exposing a potential timing side-channel. Solution(s) suse-upgrade-gnutls suse-upgrade-gnutls-guile suse-upgrade-libgnutls-devel suse-upgrade-libgnutls-devel-32bit suse-upgrade-libgnutls30 suse-upgrade-libgnutls30-32bit suse-upgrade-libgnutls30-hmac suse-upgrade-libgnutls30-hmac-32bit suse-upgrade-libgnutlsxx-devel suse-upgrade-libgnutlsxx28 References https://attackerkb.com/topics/cve-2024-28834 CVE - 2024-28834
-
SUSE: CVE-2024-26642: SUSE Linux Security Advisory
SUSE: CVE-2024-26642: SUSE Linux Security Advisory Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 03/21/2024 Created 04/18/2024 Added 04/18/2024 Modified 08/28/2024 Description In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: disallow anonymous set with timeout flag Anonymous sets are never used with timeout from userspace, reject this. Exception to this rule is NFT_SET_EVAL to ensure legacy meters still work. Solution(s) suse-upgrade-cluster-md-kmp-64kb suse-upgrade-cluster-md-kmp-azure suse-upgrade-cluster-md-kmp-default suse-upgrade-cluster-md-kmp-rt suse-upgrade-dlm-kmp-64kb suse-upgrade-dlm-kmp-azure suse-upgrade-dlm-kmp-default suse-upgrade-dlm-kmp-rt suse-upgrade-dtb-allwinner suse-upgrade-dtb-altera suse-upgrade-dtb-amazon suse-upgrade-dtb-amd suse-upgrade-dtb-amlogic suse-upgrade-dtb-apm suse-upgrade-dtb-apple suse-upgrade-dtb-arm suse-upgrade-dtb-broadcom suse-upgrade-dtb-cavium suse-upgrade-dtb-exynos suse-upgrade-dtb-freescale suse-upgrade-dtb-hisilicon suse-upgrade-dtb-lg suse-upgrade-dtb-marvell suse-upgrade-dtb-mediatek suse-upgrade-dtb-nvidia suse-upgrade-dtb-qcom suse-upgrade-dtb-renesas suse-upgrade-dtb-rockchip suse-upgrade-dtb-socionext suse-upgrade-dtb-sprd suse-upgrade-dtb-xilinx suse-upgrade-gfs2-kmp-64kb suse-upgrade-gfs2-kmp-azure suse-upgrade-gfs2-kmp-default suse-upgrade-gfs2-kmp-rt suse-upgrade-kernel-64kb suse-upgrade-kernel-64kb-devel suse-upgrade-kernel-64kb-extra suse-upgrade-kernel-64kb-livepatch-devel suse-upgrade-kernel-64kb-optional suse-upgrade-kernel-azure suse-upgrade-kernel-azure-base suse-upgrade-kernel-azure-devel suse-upgrade-kernel-azure-extra suse-upgrade-kernel-azure-livepatch-devel suse-upgrade-kernel-azure-optional suse-upgrade-kernel-azure-vdso suse-upgrade-kernel-debug suse-upgrade-kernel-debug-devel suse-upgrade-kernel-debug-livepatch-devel suse-upgrade-kernel-debug-vdso suse-upgrade-kernel-default suse-upgrade-kernel-default-base suse-upgrade-kernel-default-base-rebuild suse-upgrade-kernel-default-devel suse-upgrade-kernel-default-extra suse-upgrade-kernel-default-livepatch suse-upgrade-kernel-default-livepatch-devel suse-upgrade-kernel-default-man suse-upgrade-kernel-default-optional suse-upgrade-kernel-default-vdso suse-upgrade-kernel-devel suse-upgrade-kernel-devel-azure suse-upgrade-kernel-devel-rt suse-upgrade-kernel-docs suse-upgrade-kernel-docs-html suse-upgrade-kernel-kvmsmall suse-upgrade-kernel-kvmsmall-devel suse-upgrade-kernel-kvmsmall-livepatch-devel suse-upgrade-kernel-kvmsmall-vdso suse-upgrade-kernel-macros suse-upgrade-kernel-obs-build suse-upgrade-kernel-obs-qa suse-upgrade-kernel-preempt suse-upgrade-kernel-preempt-devel suse-upgrade-kernel-rt suse-upgrade-kernel-rt-devel suse-upgrade-kernel-rt-extra suse-upgrade-kernel-rt-livepatch suse-upgrade-kernel-rt-livepatch-devel suse-upgrade-kernel-rt-optional suse-upgrade-kernel-rt-vdso suse-upgrade-kernel-rt_debug suse-upgrade-kernel-rt_debug-devel suse-upgrade-kernel-rt_debug-livepatch-devel suse-upgrade-kernel-rt_debug-vdso suse-upgrade-kernel-source suse-upgrade-kernel-source-azure suse-upgrade-kernel-source-rt suse-upgrade-kernel-source-vanilla suse-upgrade-kernel-syms suse-upgrade-kernel-syms-azure suse-upgrade-kernel-syms-rt suse-upgrade-kernel-zfcpdump suse-upgrade-kselftests-kmp-64kb suse-upgrade-kselftests-kmp-azure suse-upgrade-kselftests-kmp-default suse-upgrade-kselftests-kmp-rt suse-upgrade-ocfs2-kmp-64kb suse-upgrade-ocfs2-kmp-azure suse-upgrade-ocfs2-kmp-default suse-upgrade-ocfs2-kmp-rt suse-upgrade-reiserfs-kmp-64kb suse-upgrade-reiserfs-kmp-azure suse-upgrade-reiserfs-kmp-default suse-upgrade-reiserfs-kmp-rt References https://attackerkb.com/topics/cve-2024-26642 CVE - 2024-26642
-
Amazon Linux AMI 2: CVE-2024-26642: Security patch for kernel (Multiple Advisories)
Amazon Linux AMI 2: CVE-2024-26642: Security patch for kernel (Multiple Advisories) Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 03/21/2024 Created 07/09/2024 Added 07/09/2024 Modified 08/19/2024 Description In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: disallow anonymous set with timeout flag Anonymous sets are never used with timeout from userspace, reject this. Exception to this rule is NFT_SET_EVAL to ensure legacy meters still work. Solution(s) amazon-linux-ami-2-upgrade-bpftool amazon-linux-ami-2-upgrade-bpftool-debuginfo amazon-linux-ami-2-upgrade-kernel amazon-linux-ami-2-upgrade-kernel-debuginfo amazon-linux-ami-2-upgrade-kernel-debuginfo-common-aarch64 amazon-linux-ami-2-upgrade-kernel-debuginfo-common-x86_64 amazon-linux-ami-2-upgrade-kernel-devel amazon-linux-ami-2-upgrade-kernel-headers amazon-linux-ami-2-upgrade-kernel-livepatch-4-14-345-262-561 amazon-linux-ami-2-upgrade-kernel-livepatch-5-10-215-203-850 amazon-linux-ami-2-upgrade-kernel-livepatch-5-15-156-102-160 amazon-linux-ami-2-upgrade-kernel-tools amazon-linux-ami-2-upgrade-kernel-tools-debuginfo amazon-linux-ami-2-upgrade-kernel-tools-devel amazon-linux-ami-2-upgrade-perf amazon-linux-ami-2-upgrade-perf-debuginfo amazon-linux-ami-2-upgrade-python-perf amazon-linux-ami-2-upgrade-python-perf-debuginfo References https://attackerkb.com/topics/cve-2024-26642 AL2/ALAS-2024-2584 AL2/ALAS-2024-2615 AL2/ALASKERNEL-5.10-2024-056 AL2/ALASKERNEL-5.15-2024-042 AL2/ALASKERNEL-5.4-2024-064 CVE - 2024-26642
-
VMware Photon OS: CVE-2024-2494
VMware Photon OS: CVE-2024-2494 Severity 5 CVSS (AV:L/AC:L/Au:N/C:N/I:N/A:C) Published 03/21/2024 Created 01/21/2025 Added 01/20/2025 Modified 02/04/2025 Description A flaw was found in the RPC library APIs of libvirt. The RPC server deserialization code allocates memory for arrays before the non-negative length check is performed by the C API entry points. Passing a negative length to the g_new0 function results in a crash due to the negative length being treated as a huge positive number. This flaw allows a local, unprivileged user to perform a denial of service attack by causing the libvirt daemon to crash. Solution(s) vmware-photon_os_update_tdnf References https://attackerkb.com/topics/cve-2024-2494 CVE - 2024-2494
-
VMware Photon OS: CVE-2024-26643
VMware Photon OS: CVE-2024-26643 Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 03/21/2024 Created 01/21/2025 Added 01/20/2025 Modified 01/20/2025 Description In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout While the rhashtable set gc runs asynchronously, a race allows it to collect elements from anonymous sets with timeouts while it is being released from the commit path. Mingi Cho originally reported this issue in a different path in 6.1.x with a pipapo set with low timeouts which is not possible upstream since 7395dfacfff6 ("netfilter: nf_tables: use timestamp to check for set element timeout"). Fix this by setting on the dead flag for anonymous sets to skip async gc in this case. According to 08e4c8c5919f ("netfilter: nf_tables: mark newset as dead on transaction abort"), Florian plans to accelerate abort path by releasing objects via workqueue, therefore, this sets on the dead flag for abort path too. Solution(s) vmware-photon_os_update_tdnf References https://attackerkb.com/topics/cve-2024-26643 CVE - 2024-26643
-
Alma Linux: CVE-2024-1394: Important: go-toolset:rhel8 security update (Multiple Advisories)
Alma Linux: CVE-2024-1394: Important: go-toolset:rhel8 security update (Multiple Advisories) Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 03/21/2024 Created 03/25/2024 Added 03/25/2024 Modified 09/30/2024 Description A memory leak flaw was found in Golang in the RSA encrypting/decrypting code, which might lead to a resource exhaustion vulnerability using attacker-controlled inputs?. The memory leak happens in github.com/golang-fips/openssl/openssl/rsa.go#L113. The objects leaked are pkey? and ctx?. That function uses named return parameters to free pkey? and ctx? if there is an error initializing the context or setting the different properties. All return statements related to error cases follow the "return nil, nil, fail(...)" pattern, meaning that pkey? and ctx? will be nil inside the deferred function that should free them. Solution(s) alma-upgrade-aardvark-dns alma-upgrade-buildah alma-upgrade-buildah-tests alma-upgrade-cockpit-podman alma-upgrade-conmon alma-upgrade-container-selinux alma-upgrade-containernetworking-plugins alma-upgrade-containers-common alma-upgrade-crit alma-upgrade-criu alma-upgrade-criu-devel alma-upgrade-criu-libs alma-upgrade-crun alma-upgrade-delve alma-upgrade-fuse-overlayfs alma-upgrade-go-toolset alma-upgrade-golang alma-upgrade-golang-bin alma-upgrade-golang-docs alma-upgrade-golang-misc alma-upgrade-golang-src alma-upgrade-golang-tests alma-upgrade-grafana alma-upgrade-grafana-pcp alma-upgrade-grafana-selinux alma-upgrade-gvisor-tap-vsock alma-upgrade-libslirp alma-upgrade-libslirp-devel alma-upgrade-netavark alma-upgrade-oci-seccomp-bpf-hook alma-upgrade-osbuild-composer alma-upgrade-osbuild-composer-core alma-upgrade-osbuild-composer-worker alma-upgrade-podman alma-upgrade-podman-catatonit alma-upgrade-podman-docker alma-upgrade-podman-gvproxy alma-upgrade-podman-plugins alma-upgrade-podman-remote alma-upgrade-podman-tests alma-upgrade-python3-criu alma-upgrade-python3-podman alma-upgrade-runc alma-upgrade-skopeo alma-upgrade-skopeo-tests alma-upgrade-slirp4netns alma-upgrade-toolbox alma-upgrade-toolbox-tests alma-upgrade-udica References https://attackerkb.com/topics/cve-2024-1394 CVE - 2024-1394 https://errata.almalinux.org/8/ALSA-2024-1472.html https://errata.almalinux.org/8/ALSA-2024-1644.html https://errata.almalinux.org/8/ALSA-2024-1646.html https://errata.almalinux.org/8/ALSA-2024-3265.html https://errata.almalinux.org/8/ALSA-2024-5258.html https://errata.almalinux.org/8/ALSA-2024-7262.html https://errata.almalinux.org/9/ALSA-2024-1462.html https://errata.almalinux.org/9/ALSA-2024-1501.html https://errata.almalinux.org/9/ALSA-2024-1502.html https://errata.almalinux.org/9/ALSA-2024-2562.html https://errata.almalinux.org/9/ALSA-2024-2568.html https://errata.almalinux.org/9/ALSA-2024-2569.html https://errata.almalinux.org/9/ALSA-2024-4371.html https://errata.almalinux.org/9/ALSA-2024-4378.html https://errata.almalinux.org/9/ALSA-2024-4379.html https://errata.almalinux.org/9/ALSA-2024-4502.html https://errata.almalinux.org/9/ALSA-2024-4761.html https://errata.almalinux.org/9/ALSA-2024-4762.html View more
-
VMware Photon OS: CVE-2024-28835
VMware Photon OS: CVE-2024-28835 Severity 5 CVSS (AV:L/AC:L/Au:S/C:N/I:N/A:C) Published 03/21/2024 Created 01/21/2025 Added 01/20/2025 Modified 02/04/2025 Description A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the "certtool --verify-chain" command. Solution(s) vmware-photon_os_update_tdnf References https://attackerkb.com/topics/cve-2024-28835 CVE - 2024-28835
-
VMware Photon OS: CVE-2024-28834
VMware Photon OS: CVE-2024-28834 Severity 5 CVSS (AV:N/AC:H/Au:S/C:C/I:N/A:N) Published 03/21/2024 Created 01/21/2025 Added 01/20/2025 Modified 02/04/2025 Description A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading to side-channel leaks. In specific scenarios, such as when using the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result in a noticeable step in nonce size from 513 to 512 bits, exposing a potential timing side-channel. Solution(s) vmware-photon_os_update_tdnf References https://attackerkb.com/topics/cve-2024-28834 CVE - 2024-28834
-
Alpine Linux: CVE-2023-46840: Vulnerability in Multiple Components
Alpine Linux: CVE-2023-46840: Vulnerability in Multiple Components Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 03/20/2024 Created 08/23/2024 Added 08/22/2024 Modified 08/22/2024 Description Incorrect placement of a preprocessor directive in source code results in logic that doesn't operate as intended when support for HVM guests is compiled out of Xen. Solution(s) alpine-linux-upgrade-xen References https://attackerkb.com/topics/cve-2023-46840 CVE - 2023-46840 https://security.alpinelinux.org/vuln/CVE-2023-46840
-
Gentoo Linux: CVE-2024-2628: Chromium, Google Chrome, Microsoft Edge. Opera: Multiple Vulnerabilities
Gentoo Linux: CVE-2024-2628: Chromium, Google Chrome, Microsoft Edge. Opera: Multiple Vulnerabilities Severity 4 CVSS (AV:N/AC:M/Au:N/C:N/I:P/A:N) Published 03/20/2024 Created 12/10/2024 Added 12/09/2024 Modified 01/28/2025 Description Inappropriate implementation in Downloads in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to perform UI spoofing via a crafted URL. (Chromium security severity: Medium) Solution(s) gentoo-linux-upgrade-ww-client-microsoft-edge gentoo-linux-upgrade-www-client-chromium gentoo-linux-upgrade-www-client-google-chrome gentoo-linux-upgrade-www-client-microsoft-edge gentoo-linux-upgrade-www-client-opera References https://attackerkb.com/topics/cve-2024-2628 CVE - 2024-2628 202412-05
-
Amazon Linux 2023: CVE-2024-26642: Medium priority package update for kernel (Multiple Advisories)
Amazon Linux 2023: CVE-2024-26642: Medium priority package update for kernel (Multiple Advisories) Severity 4 CVSS (AV:L/AC:H/Au:S/C:N/I:N/A:C) Published 03/21/2024 Created 02/14/2025 Added 02/14/2025 Modified 02/14/2025 Description In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: disallow anonymous set with timeout flag Anonymous sets are never used with timeout from userspace, reject this. Exception to this rule is NFT_SET_EVAL to ensure legacy meters still work. Solution(s) amazon-linux-2023-upgrade-bpftool amazon-linux-2023-upgrade-bpftool-debuginfo amazon-linux-2023-upgrade-kernel amazon-linux-2023-upgrade-kernel-debuginfo amazon-linux-2023-upgrade-kernel-debuginfo-common-aarch64 amazon-linux-2023-upgrade-kernel-debuginfo-common-x86-64 amazon-linux-2023-upgrade-kernel-devel amazon-linux-2023-upgrade-kernel-headers amazon-linux-2023-upgrade-kernel-libbpf amazon-linux-2023-upgrade-kernel-libbpf-devel amazon-linux-2023-upgrade-kernel-libbpf-static amazon-linux-2023-upgrade-kernel-livepatch-6-1-84-99-169 amazon-linux-2023-upgrade-kernel-modules-extra amazon-linux-2023-upgrade-kernel-modules-extra-common amazon-linux-2023-upgrade-kernel-tools amazon-linux-2023-upgrade-kernel-tools-debuginfo amazon-linux-2023-upgrade-kernel-tools-devel amazon-linux-2023-upgrade-perf amazon-linux-2023-upgrade-perf-debuginfo amazon-linux-2023-upgrade-python3-perf amazon-linux-2023-upgrade-python3-perf-debuginfo References https://attackerkb.com/topics/cve-2024-26642 CVE - 2024-26642 https://alas.aws.amazon.com/AL2023/ALAS-2024-585.html https://alas.aws.amazon.com/AL2023/ALAS-2024-696.html
-
Rocky Linux: CVE-2024-26642: kernel-rt (Multiple Advisories)
Rocky Linux: CVE-2024-26642: kernel-rt (Multiple Advisories) Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 03/21/2024 Created 06/17/2024 Added 06/17/2024 Modified 11/18/2024 Description In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: disallow anonymous set with timeout flag Anonymous sets are never used with timeout from userspace, reject this. Exception to this rule is NFT_SET_EVAL to ensure legacy meters still work. Solution(s) rocky-upgrade-bpftool rocky-upgrade-bpftool-debuginfo rocky-upgrade-kernel rocky-upgrade-kernel-core rocky-upgrade-kernel-cross-headers rocky-upgrade-kernel-debug rocky-upgrade-kernel-debug-core rocky-upgrade-kernel-debug-debuginfo rocky-upgrade-kernel-debug-devel rocky-upgrade-kernel-debug-modules rocky-upgrade-kernel-debug-modules-extra rocky-upgrade-kernel-debuginfo rocky-upgrade-kernel-debuginfo-common-x86_64 rocky-upgrade-kernel-devel rocky-upgrade-kernel-headers rocky-upgrade-kernel-modules rocky-upgrade-kernel-modules-extra rocky-upgrade-kernel-rt rocky-upgrade-kernel-rt-core rocky-upgrade-kernel-rt-debug rocky-upgrade-kernel-rt-debug-core rocky-upgrade-kernel-rt-debug-debuginfo rocky-upgrade-kernel-rt-debug-devel rocky-upgrade-kernel-rt-debug-kvm rocky-upgrade-kernel-rt-debug-modules rocky-upgrade-kernel-rt-debug-modules-extra rocky-upgrade-kernel-rt-debuginfo rocky-upgrade-kernel-rt-debuginfo-common-x86_64 rocky-upgrade-kernel-rt-devel rocky-upgrade-kernel-rt-kvm rocky-upgrade-kernel-rt-modules rocky-upgrade-kernel-rt-modules-extra rocky-upgrade-kernel-tools rocky-upgrade-kernel-tools-debuginfo rocky-upgrade-kernel-tools-libs rocky-upgrade-kernel-tools-libs-devel rocky-upgrade-perf rocky-upgrade-perf-debuginfo rocky-upgrade-python3-perf rocky-upgrade-python3-perf-debuginfo References https://attackerkb.com/topics/cve-2024-26642 CVE - 2024-26642 https://errata.rockylinux.org/RLSA-2024:3618 https://errata.rockylinux.org/RLSA-2024:3627
-
Rocky Linux: CVE-2023-52620: kernel (Multiple Advisories)
Rocky Linux: CVE-2023-52620: kernel (Multiple Advisories) Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 03/21/2024 Created 06/17/2024 Added 06/17/2024 Modified 11/18/2024 Description In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: disallow timeout for anonymous sets Never used from userspace, disallow these parameters. Solution(s) rocky-upgrade-bpftool rocky-upgrade-bpftool-debuginfo rocky-upgrade-kernel rocky-upgrade-kernel-core rocky-upgrade-kernel-cross-headers rocky-upgrade-kernel-debug rocky-upgrade-kernel-debug-core rocky-upgrade-kernel-debug-debuginfo rocky-upgrade-kernel-debug-devel rocky-upgrade-kernel-debug-modules rocky-upgrade-kernel-debug-modules-extra rocky-upgrade-kernel-debuginfo rocky-upgrade-kernel-debuginfo-common-x86_64 rocky-upgrade-kernel-devel rocky-upgrade-kernel-headers rocky-upgrade-kernel-modules rocky-upgrade-kernel-modules-extra rocky-upgrade-kernel-rt rocky-upgrade-kernel-rt-core rocky-upgrade-kernel-rt-debug rocky-upgrade-kernel-rt-debug-core rocky-upgrade-kernel-rt-debug-debuginfo rocky-upgrade-kernel-rt-debug-devel rocky-upgrade-kernel-rt-debug-kvm rocky-upgrade-kernel-rt-debug-modules rocky-upgrade-kernel-rt-debug-modules-extra rocky-upgrade-kernel-rt-debuginfo rocky-upgrade-kernel-rt-debuginfo-common-x86_64 rocky-upgrade-kernel-rt-devel rocky-upgrade-kernel-rt-kvm rocky-upgrade-kernel-rt-modules rocky-upgrade-kernel-rt-modules-extra rocky-upgrade-kernel-tools rocky-upgrade-kernel-tools-debuginfo rocky-upgrade-kernel-tools-libs rocky-upgrade-kernel-tools-libs-devel rocky-upgrade-perf rocky-upgrade-perf-debuginfo rocky-upgrade-python3-perf rocky-upgrade-python3-perf-debuginfo References https://attackerkb.com/topics/cve-2023-52620 CVE - 2023-52620 https://errata.rockylinux.org/RLSA-2024:2950 https://errata.rockylinux.org/RLSA-2024:3138
-
Rocky Linux: CVE-2024-2494: virt-rhel-and-virt-devel-rhel (Multiple Advisories)
Rocky Linux: CVE-2024-2494: virt-rhel-and-virt-devel-rhel (Multiple Advisories) Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 03/21/2024 Created 05/13/2024 Added 05/13/2024 Modified 11/20/2024 Description A flaw was found in the RPC library APIs of libvirt. The RPC server deserialization code allocates memory for arrays before the non-negative length check is performed by the C API entry points. Passing a negative length to the g_new0 function results in a crash due to the negative length being treated as a huge positive number. This flaw allows a local, unprivileged user to perform a denial of service attack by causing the libvirt daemon to crash. Solution(s) rocky-upgrade-hivex rocky-upgrade-hivex-debuginfo rocky-upgrade-hivex-debugsource rocky-upgrade-hivex-devel rocky-upgrade-libguestfs rocky-upgrade-libguestfs-appliance rocky-upgrade-libguestfs-debuginfo rocky-upgrade-libguestfs-debugsource rocky-upgrade-libguestfs-devel rocky-upgrade-libguestfs-gfs2 rocky-upgrade-libguestfs-gobject rocky-upgrade-libguestfs-gobject-debuginfo rocky-upgrade-libguestfs-gobject-devel rocky-upgrade-libguestfs-java rocky-upgrade-libguestfs-java-debuginfo rocky-upgrade-libguestfs-java-devel rocky-upgrade-libguestfs-rescue rocky-upgrade-libguestfs-rsync rocky-upgrade-libguestfs-tools-c rocky-upgrade-libguestfs-tools-c-debuginfo rocky-upgrade-libguestfs-winsupport rocky-upgrade-libguestfs-xfs rocky-upgrade-libiscsi rocky-upgrade-libiscsi-debuginfo rocky-upgrade-libiscsi-debugsource rocky-upgrade-libiscsi-devel rocky-upgrade-libiscsi-utils rocky-upgrade-libiscsi-utils-debuginfo rocky-upgrade-libnbd rocky-upgrade-libnbd-debuginfo rocky-upgrade-libnbd-debugsource rocky-upgrade-libnbd-devel rocky-upgrade-libtpms rocky-upgrade-libtpms-debuginfo rocky-upgrade-libtpms-debugsource rocky-upgrade-libtpms-devel rocky-upgrade-libvirt rocky-upgrade-libvirt-client rocky-upgrade-libvirt-client-debuginfo rocky-upgrade-libvirt-client-qemu rocky-upgrade-libvirt-daemon rocky-upgrade-libvirt-daemon-common rocky-upgrade-libvirt-daemon-common-debuginfo rocky-upgrade-libvirt-daemon-config-network rocky-upgrade-libvirt-daemon-config-nwfilter rocky-upgrade-libvirt-daemon-debuginfo rocky-upgrade-libvirt-daemon-driver-interface rocky-upgrade-libvirt-daemon-driver-interface-debuginfo rocky-upgrade-libvirt-daemon-driver-network rocky-upgrade-libvirt-daemon-driver-network-debuginfo rocky-upgrade-libvirt-daemon-driver-nodedev rocky-upgrade-libvirt-daemon-driver-nodedev-debuginfo rocky-upgrade-libvirt-daemon-driver-nwfilter rocky-upgrade-libvirt-daemon-driver-nwfilter-debuginfo rocky-upgrade-libvirt-daemon-driver-qemu rocky-upgrade-libvirt-daemon-driver-qemu-debuginfo rocky-upgrade-libvirt-daemon-driver-secret rocky-upgrade-libvirt-daemon-driver-secret-debuginfo rocky-upgrade-libvirt-daemon-driver-storage rocky-upgrade-libvirt-daemon-driver-storage-core rocky-upgrade-libvirt-daemon-driver-storage-core-debuginfo rocky-upgrade-libvirt-daemon-driver-storage-disk rocky-upgrade-libvirt-daemon-driver-storage-disk-debuginfo rocky-upgrade-libvirt-daemon-driver-storage-gluster rocky-upgrade-libvirt-daemon-driver-storage-gluster-debuginfo rocky-upgrade-libvirt-daemon-driver-storage-iscsi rocky-upgrade-libvirt-daemon-driver-storage-iscsi-debuginfo rocky-upgrade-libvirt-daemon-driver-storage-iscsi-direct rocky-upgrade-libvirt-daemon-driver-storage-iscsi-direct-debuginfo rocky-upgrade-libvirt-daemon-driver-storage-logical rocky-upgrade-libvirt-daemon-driver-storage-logical-debuginfo rocky-upgrade-libvirt-daemon-driver-storage-mpath rocky-upgrade-libvirt-daemon-driver-storage-mpath-debuginfo rocky-upgrade-libvirt-daemon-driver-storage-rbd rocky-upgrade-libvirt-daemon-driver-storage-rbd-debuginfo rocky-upgrade-libvirt-daemon-driver-storage-scsi rocky-upgrade-libvirt-daemon-driver-storage-scsi-debuginfo rocky-upgrade-libvirt-daemon-kvm rocky-upgrade-libvirt-daemon-lock rocky-upgrade-libvirt-daemon-lock-debuginfo rocky-upgrade-libvirt-daemon-log rocky-upgrade-libvirt-daemon-log-debuginfo rocky-upgrade-libvirt-daemon-plugin-lockd rocky-upgrade-libvirt-daemon-plugin-lockd-debuginfo rocky-upgrade-libvirt-daemon-plugin-sanlock rocky-upgrade-libvirt-daemon-plugin-sanlock-debuginfo rocky-upgrade-libvirt-daemon-proxy rocky-upgrade-libvirt-daemon-proxy-debuginfo rocky-upgrade-libvirt-dbus rocky-upgrade-libvirt-dbus-debuginfo rocky-upgrade-libvirt-dbus-debugsource rocky-upgrade-libvirt-debuginfo rocky-upgrade-libvirt-debugsource rocky-upgrade-libvirt-devel rocky-upgrade-libvirt-docs rocky-upgrade-libvirt-libs rocky-upgrade-libvirt-libs-debuginfo rocky-upgrade-libvirt-lock-sanlock rocky-upgrade-libvirt-lock-sanlock-debuginfo rocky-upgrade-libvirt-nss rocky-upgrade-libvirt-nss-debuginfo rocky-upgrade-libvirt-python-debugsource rocky-upgrade-libvirt-wireshark rocky-upgrade-libvirt-wireshark-debuginfo rocky-upgrade-lua-guestfs rocky-upgrade-lua-guestfs-debuginfo rocky-upgrade-nbdfuse rocky-upgrade-nbdfuse-debuginfo rocky-upgrade-nbdkit rocky-upgrade-nbdkit-basic-filters rocky-upgrade-nbdkit-basic-filters-debuginfo rocky-upgrade-nbdkit-basic-plugins rocky-upgrade-nbdkit-basic-plugins-debuginfo rocky-upgrade-nbdkit-curl-plugin rocky-upgrade-nbdkit-curl-plugin-debuginfo rocky-upgrade-nbdkit-debuginfo rocky-upgrade-nbdkit-debugsource rocky-upgrade-nbdkit-devel rocky-upgrade-nbdkit-example-plugins rocky-upgrade-nbdkit-example-plugins-debuginfo rocky-upgrade-nbdkit-gzip-filter rocky-upgrade-nbdkit-gzip-filter-debuginfo rocky-upgrade-nbdkit-gzip-plugin rocky-upgrade-nbdkit-gzip-plugin-debuginfo rocky-upgrade-nbdkit-linuxdisk-plugin rocky-upgrade-nbdkit-linuxdisk-plugin-debuginfo rocky-upgrade-nbdkit-nbd-plugin rocky-upgrade-nbdkit-nbd-plugin-debuginfo rocky-upgrade-nbdkit-python-plugin rocky-upgrade-nbdkit-python-plugin-debuginfo rocky-upgrade-nbdkit-server rocky-upgrade-nbdkit-server-debuginfo rocky-upgrade-nbdkit-ssh-plugin rocky-upgrade-nbdkit-ssh-plugin-debuginfo rocky-upgrade-nbdkit-tar-filter rocky-upgrade-nbdkit-tar-filter-debuginfo rocky-upgrade-nbdkit-tar-plugin rocky-upgrade-nbdkit-tar-plugin-debuginfo rocky-upgrade-nbdkit-tmpdisk-plugin rocky-upgrade-nbdkit-tmpdisk-plugin-debuginfo rocky-upgrade-nbdkit-vddk-plugin rocky-upgrade-nbdkit-vddk-plugin-debuginfo rocky-upgrade-nbdkit-xz-filter rocky-upgrade-nbdkit-xz-filter-debuginfo rocky-upgrade-netcf rocky-upgrade-netcf-debuginfo rocky-upgrade-netcf-debugsource rocky-upgrade-netcf-devel rocky-upgrade-netcf-libs rocky-upgrade-netcf-libs-debuginfo rocky-upgrade-ocaml-hivex rocky-upgrade-ocaml-hivex-debuginfo rocky-upgrade-ocaml-hivex-devel rocky-upgrade-ocaml-libguestfs rocky-upgrade-ocaml-libguestfs-debuginfo rocky-upgrade-ocaml-libguestfs-devel rocky-upgrade-ocaml-libnbd rocky-upgrade-ocaml-libnbd-debuginfo rocky-upgrade-ocaml-libnbd-devel rocky-upgrade-perl-hivex rocky-upgrade-perl-hivex-debuginfo rocky-upgrade-perl-sys-guestfs rocky-upgrade-perl-sys-guestfs-debuginfo rocky-upgrade-perl-sys-virt rocky-upgrade-perl-sys-virt-debuginfo rocky-upgrade-perl-sys-virt-debugsource rocky-upgrade-python3-hivex rocky-upgrade-python3-hivex-debuginfo rocky-upgrade-python3-libguestfs rocky-upgrade-python3-libguestfs-debuginfo rocky-upgrade-python3-libnbd rocky-upgrade-python3-libnbd-debuginfo rocky-upgrade-python3-libvirt rocky-upgrade-python3-libvirt-debuginfo rocky-upgrade-qemu-guest-agent rocky-upgrade-qemu-guest-agent-debuginfo rocky-upgrade-qemu-img rocky-upgrade-qemu-img-debuginfo rocky-upgrade-qemu-kvm rocky-upgrade-qemu-kvm-block-curl rocky-upgrade-qemu-kvm-block-curl-debuginfo rocky-upgrade-qemu-kvm-block-gluster rocky-upgrade-qemu-kvm-block-gluster-debuginfo rocky-upgrade-qemu-kvm-block-iscsi rocky-upgrade-qemu-kvm-block-iscsi-debuginfo rocky-upgrade-qemu-kvm-block-rbd rocky-upgrade-qemu-kvm-block-rbd-debuginfo rocky-upgrade-qemu-kvm-block-ssh rocky-upgrade-qemu-kvm-block-ssh-debuginfo rocky-upgrade-qemu-kvm-common rocky-upgrade-qemu-kvm-common-debuginfo rocky-upgrade-qemu-kvm-core rocky-upgrade-qemu-kvm-core-debuginfo rocky-upgrade-qemu-kvm-debuginfo rocky-upgrade-qemu-kvm-debugsource rocky-upgrade-qemu-kvm-docs rocky-upgrade-qemu-kvm-hw-usbredir rocky-upgrade-qemu-kvm-hw-usbredir-debuginfo rocky-upgrade-qemu-kvm-tests rocky-upgrade-qemu-kvm-ui-opengl rocky-upgrade-qemu-kvm-ui-opengl-debuginfo rocky-upgrade-qemu-kvm-ui-spice rocky-upgrade-qemu-kvm-ui-spice-debuginfo rocky-upgrade-ruby-hivex rocky-upgrade-ruby-hivex-debuginfo rocky-upgrade-ruby-libguestfs rocky-upgrade-ruby-libguestfs-debuginfo rocky-upgrade-seabios rocky-upgrade-sgabios rocky-upgrade-supermin rocky-upgrade-supermin-debuginfo rocky-upgrade-supermin-debugsource rocky-upgrade-supermin-devel rocky-upgrade-swtpm rocky-upgrade-swtpm-debuginfo rocky-upgrade-swtpm-debugsource rocky-upgrade-swtpm-devel rocky-upgrade-swtpm-libs rocky-upgrade-swtpm-libs-debuginfo rocky-upgrade-swtpm-tools rocky-upgrade-swtpm-tools-debuginfo rocky-upgrade-swtpm-tools-pkcs11 rocky-upgrade-virt-dib rocky-upgrade-virt-dib-debuginfo rocky-upgrade-virt-v2v rocky-upgrade-virt-v2v-debuginfo rocky-upgrade-virt-v2v-debugsource References https://attackerkb.com/topics/cve-2024-2494 CVE - 2024-2494 https://errata.rockylinux.org/RLSA-2024:2560 https://errata.rockylinux.org/RLSA-2024:3253
-
Rocky Linux: CVE-2024-28834: gnutls (Multiple Advisories)
Rocky Linux: CVE-2024-28834: gnutls (Multiple Advisories) Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 03/21/2024 Created 05/08/2024 Added 05/08/2024 Modified 11/18/2024 Description A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading to side-channel leaks. In specific scenarios, such as when using the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result in a noticeable step in nonce size from 513 to 512 bits, exposing a potential timing side-channel. Solution(s) rocky-upgrade-gnutls rocky-upgrade-gnutls-c++ rocky-upgrade-gnutls-c++-debuginfo rocky-upgrade-gnutls-dane rocky-upgrade-gnutls-dane-debuginfo rocky-upgrade-gnutls-debuginfo rocky-upgrade-gnutls-debugsource rocky-upgrade-gnutls-devel rocky-upgrade-gnutls-utils rocky-upgrade-gnutls-utils-debuginfo References https://attackerkb.com/topics/cve-2024-28834 CVE - 2024-28834 https://errata.rockylinux.org/RLSA-2024:1784 https://errata.rockylinux.org/RLSA-2024:2570
-
Rocky Linux: CVE-2024-28102: idm-DL1-and-idm-client (Multiple Advisories)
Rocky Linux: CVE-2024-28102: idm-DL1-and-idm-client (Multiple Advisories) Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 03/21/2024 Created 05/13/2024 Added 05/13/2024 Modified 08/28/2024 Description JWCrypto implements JWK, JWS, and JWE specifications using python-cryptography. Prior to version 1.5.6, an attacker can cause a denial of service attack by passing in a malicious JWE Token with a high compression ratio. When the server processes this token, it will consume a lot of memory and processing time. Version 1.5.6 fixes this vulnerability by limiting the maximum token length. Solution(s) rocky-upgrade-bind-dyndb-ldap rocky-upgrade-bind-dyndb-ldap-debuginfo rocky-upgrade-bind-dyndb-ldap-debugsource rocky-upgrade-ipa-client rocky-upgrade-ipa-client-debuginfo rocky-upgrade-ipa-client-epn rocky-upgrade-ipa-client-samba rocky-upgrade-ipa-debuginfo rocky-upgrade-ipa-debugsource rocky-upgrade-ipa-server rocky-upgrade-ipa-server-debuginfo rocky-upgrade-ipa-server-trust-ad rocky-upgrade-ipa-server-trust-ad-debuginfo rocky-upgrade-opendnssec rocky-upgrade-opendnssec-debuginfo rocky-upgrade-opendnssec-debugsource rocky-upgrade-slapi-nis rocky-upgrade-slapi-nis-debuginfo rocky-upgrade-slapi-nis-debugsource rocky-upgrade-softhsm rocky-upgrade-softhsm-debuginfo rocky-upgrade-softhsm-debugsource rocky-upgrade-softhsm-devel References https://attackerkb.com/topics/cve-2024-28102 CVE - 2024-28102 https://errata.rockylinux.org/RLSA-2024:2559 https://errata.rockylinux.org/RLSA-2024:3267
-
Rocky Linux: CVE-2024-28835: gnutls (RLSA-2024-2570)
Rocky Linux: CVE-2024-28835: gnutls (RLSA-2024-2570) Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 03/21/2024 Created 05/13/2024 Added 05/13/2024 Modified 11/18/2024 Description A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the "certtool --verify-chain" command. Solution(s) rocky-upgrade-gnutls rocky-upgrade-gnutls-c++ rocky-upgrade-gnutls-c++-debuginfo rocky-upgrade-gnutls-dane rocky-upgrade-gnutls-dane-debuginfo rocky-upgrade-gnutls-debuginfo rocky-upgrade-gnutls-debugsource rocky-upgrade-gnutls-devel rocky-upgrade-gnutls-utils rocky-upgrade-gnutls-utils-debuginfo References https://attackerkb.com/topics/cve-2024-28835 CVE - 2024-28835 https://errata.rockylinux.org/RLSA-2024:2570
-
Rocky Linux: CVE-2024-28863: nodejs-18 (Multiple Advisories)
Rocky Linux: CVE-2024-28863: nodejs-18 (Multiple Advisories) Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 03/21/2024 Created 09/18/2024 Added 09/17/2024 Modified 11/18/2024 Description node-tar is a Tar for Node.js. node-tar prior to version 6.2.1 has no limit on the number of sub-folders created in the folder creation process. An attacker who generates a large number of sub-folders can consume memory on the system running node-tar and even crash the Node.js client within few seconds of running it using a path with too many sub-folders inside. Version 6.2.1 fixes this issue by preventing extraction in excessively deep sub-folders. Solution(s) rocky-upgrade-nodejs rocky-upgrade-nodejs-debuginfo rocky-upgrade-nodejs-debugsource rocky-upgrade-nodejs-devel rocky-upgrade-nodejs-full-i18n rocky-upgrade-npm References https://attackerkb.com/topics/cve-2024-28863 CVE - 2024-28863 https://errata.rockylinux.org/RLSA-2024:5814 https://errata.rockylinux.org/RLSA-2024:6147 https://errata.rockylinux.org/RLSA-2024:6148
-
Ubuntu: (Multiple Advisories) (CVE-2024-26643): Linux kernel vulnerabilities
Ubuntu: (Multiple Advisories) (CVE-2024-26643): Linux kernel vulnerabilities Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 03/21/2024 Created 07/04/2024 Added 07/04/2024 Modified 07/31/2024 Description In the Linux kernel, the following vulnerability has been resolved: netfilter: nf_tables: mark set as dead when unbinding anonymous set with timeout While the rhashtable set gc runs asynchronously, a race allows it to collect elements from anonymous sets with timeouts while it is being released from the commit path. Mingi Cho originally reported this issue in a different path in 6.1.x with a pipapo set with low timeouts which is not possible upstream since 7395dfacfff6 ("netfilter: nf_tables: use timestamp to check for set element timeout"). Fix this by setting on the dead flag for anonymous sets to skip async gc in this case. According to 08e4c8c5919f ("netfilter: nf_tables: mark newset as dead on transaction abort"), Florian plans to accelerate abort path by releasing objects via workqueue, therefore, this sets on the dead flag for abort path too. Solution(s) ubuntu-upgrade-linux-image-5-15-0-1031-xilinx-zynqmp ubuntu-upgrade-linux-image-5-15-0-1047-gkeop ubuntu-upgrade-linux-image-5-15-0-1057-ibm ubuntu-upgrade-linux-image-5-15-0-1058-raspi ubuntu-upgrade-linux-image-5-15-0-1059-intel-iotg ubuntu-upgrade-linux-image-5-15-0-1059-nvidia ubuntu-upgrade-linux-image-5-15-0-1059-nvidia-lowlatency ubuntu-upgrade-linux-image-5-15-0-1061-gke ubuntu-upgrade-linux-image-5-15-0-1061-kvm ubuntu-upgrade-linux-image-5-15-0-1062-oracle ubuntu-upgrade-linux-image-5-15-0-1063-gcp ubuntu-upgrade-linux-image-5-15-0-1064-aws ubuntu-upgrade-linux-image-5-15-0-1065-gcp ubuntu-upgrade-linux-image-5-15-0-1067-azure ubuntu-upgrade-linux-image-5-15-0-1067-azure-fde ubuntu-upgrade-linux-image-5-15-0-113-generic ubuntu-upgrade-linux-image-5-15-0-113-generic-64k ubuntu-upgrade-linux-image-5-15-0-113-generic-lpae ubuntu-upgrade-linux-image-5-15-0-113-lowlatency ubuntu-upgrade-linux-image-5-15-0-113-lowlatency-64k ubuntu-upgrade-linux-image-5-4-0-1039-iot ubuntu-upgrade-linux-image-5-4-0-1046-xilinx-zynqmp ubuntu-upgrade-linux-image-5-4-0-1074-ibm ubuntu-upgrade-linux-image-5-4-0-1075-ibm ubuntu-upgrade-linux-image-5-4-0-1087-bluefield ubuntu-upgrade-linux-image-5-4-0-1088-bluefield ubuntu-upgrade-linux-image-5-4-0-1094-gkeop ubuntu-upgrade-linux-image-5-4-0-1095-gkeop ubuntu-upgrade-linux-image-5-4-0-1111-raspi ubuntu-upgrade-linux-image-5-4-0-1115-kvm ubuntu-upgrade-linux-image-5-4-0-1116-kvm ubuntu-upgrade-linux-image-5-4-0-1126-oracle ubuntu-upgrade-linux-image-5-4-0-1127-aws ubuntu-upgrade-linux-image-5-4-0-1131-gcp ubuntu-upgrade-linux-image-5-4-0-1132-azure ubuntu-upgrade-linux-image-5-4-0-1132-gcp ubuntu-upgrade-linux-image-5-4-0-1133-azure ubuntu-upgrade-linux-image-5-4-0-187-generic ubuntu-upgrade-linux-image-5-4-0-187-generic-lpae ubuntu-upgrade-linux-image-5-4-0-187-lowlatency ubuntu-upgrade-linux-image-5-4-0-189-generic ubuntu-upgrade-linux-image-5-4-0-189-generic-lpae ubuntu-upgrade-linux-image-5-4-0-189-lowlatency ubuntu-upgrade-linux-image-6-5-0-1016-starfive ubuntu-upgrade-linux-image-6-5-0-1018-laptop ubuntu-upgrade-linux-image-6-5-0-1019-raspi ubuntu-upgrade-linux-image-6-5-0-1022-aws ubuntu-upgrade-linux-image-6-5-0-1022-nvidia ubuntu-upgrade-linux-image-6-5-0-1022-nvidia-64k ubuntu-upgrade-linux-image-6-5-0-1023-azure ubuntu-upgrade-linux-image-6-5-0-1023-azure-fde ubuntu-upgrade-linux-image-6-5-0-1023-gcp ubuntu-upgrade-linux-image-6-5-0-1025-oem ubuntu-upgrade-linux-image-6-5-0-1025-oracle ubuntu-upgrade-linux-image-6-5-0-1025-oracle-64k ubuntu-upgrade-linux-image-6-5-0-42-generic ubuntu-upgrade-linux-image-6-5-0-42-generic-64k ubuntu-upgrade-linux-image-6-5-0-42-lowlatency ubuntu-upgrade-linux-image-6-5-0-42-lowlatency-64k ubuntu-upgrade-linux-image-6-5-0-44-generic ubuntu-upgrade-linux-image-6-5-0-44-generic-64k ubuntu-upgrade-linux-image-aws ubuntu-upgrade-linux-image-aws-lts-20-04 ubuntu-upgrade-linux-image-aws-lts-22-04 ubuntu-upgrade-linux-image-azure ubuntu-upgrade-linux-image-azure-cvm ubuntu-upgrade-linux-image-azure-fde ubuntu-upgrade-linux-image-azure-fde-lts-22-04 ubuntu-upgrade-linux-image-azure-lts-20-04 ubuntu-upgrade-linux-image-azure-lts-22-04 ubuntu-upgrade-linux-image-bluefield ubuntu-upgrade-linux-image-gcp ubuntu-upgrade-linux-image-gcp-lts-20-04 ubuntu-upgrade-linux-image-gcp-lts-22-04 ubuntu-upgrade-linux-image-generic ubuntu-upgrade-linux-image-generic-64k ubuntu-upgrade-linux-image-generic-64k-hwe-20-04 ubuntu-upgrade-linux-image-generic-64k-hwe-22-04 ubuntu-upgrade-linux-image-generic-hwe-18-04 ubuntu-upgrade-linux-image-generic-hwe-20-04 ubuntu-upgrade-linux-image-generic-hwe-22-04 ubuntu-upgrade-linux-image-generic-lpae ubuntu-upgrade-linux-image-generic-lpae-hwe-20-04 ubuntu-upgrade-linux-image-gke ubuntu-upgrade-linux-image-gke-5-15 ubuntu-upgrade-linux-image-gkeop ubuntu-upgrade-linux-image-gkeop-5-15 ubuntu-upgrade-linux-image-gkeop-5-4 ubuntu-upgrade-linux-image-ibm ubuntu-upgrade-linux-image-ibm-lts-20-04 ubuntu-upgrade-linux-image-intel ubuntu-upgrade-linux-image-intel-iotg ubuntu-upgrade-linux-image-kvm ubuntu-upgrade-linux-image-laptop-23-10 ubuntu-upgrade-linux-image-lowlatency ubuntu-upgrade-linux-image-lowlatency-64k ubuntu-upgrade-linux-image-lowlatency-64k-hwe-20-04 ubuntu-upgrade-linux-image-lowlatency-64k-hwe-22-04 ubuntu-upgrade-linux-image-lowlatency-hwe-18-04 ubuntu-upgrade-linux-image-lowlatency-hwe-20-04 ubuntu-upgrade-linux-image-lowlatency-hwe-22-04 ubuntu-upgrade-linux-image-nvidia ubuntu-upgrade-linux-image-nvidia-6-5 ubuntu-upgrade-linux-image-nvidia-64k-6-5 ubuntu-upgrade-linux-image-nvidia-64k-hwe-22-04 ubuntu-upgrade-linux-image-nvidia-hwe-22-04 ubuntu-upgrade-linux-image-nvidia-lowlatency ubuntu-upgrade-linux-image-oem ubuntu-upgrade-linux-image-oem-20-04 ubuntu-upgrade-linux-image-oem-20-04b ubuntu-upgrade-linux-image-oem-20-04c ubuntu-upgrade-linux-image-oem-20-04d ubuntu-upgrade-linux-image-oem-22-04 ubuntu-upgrade-linux-image-oem-22-04a ubuntu-upgrade-linux-image-oem-22-04b ubuntu-upgrade-linux-image-oem-22-04c ubuntu-upgrade-linux-image-oem-22-04d ubuntu-upgrade-linux-image-oem-osp1 ubuntu-upgrade-linux-image-oracle ubuntu-upgrade-linux-image-oracle-64k ubuntu-upgrade-linux-image-oracle-lts-20-04 ubuntu-upgrade-linux-image-oracle-lts-22-04 ubuntu-upgrade-linux-image-raspi ubuntu-upgrade-linux-image-raspi-hwe-18-04 ubuntu-upgrade-linux-image-raspi-nolpae ubuntu-upgrade-linux-image-raspi2 ubuntu-upgrade-linux-image-snapdragon-hwe-18-04 ubuntu-upgrade-linux-image-starfive ubuntu-upgrade-linux-image-virtual ubuntu-upgrade-linux-image-virtual-hwe-18-04 ubuntu-upgrade-linux-image-virtual-hwe-20-04 ubuntu-upgrade-linux-image-virtual-hwe-22-04 ubuntu-upgrade-linux-image-xilinx-zynqmp References https://attackerkb.com/topics/cve-2024-26643 CVE - 2024-26643 USN-6868-1 USN-6868-2 USN-6869-1 USN-6870-1 USN-6870-2 USN-6871-1 USN-6872-1 USN-6872-2 USN-6873-1 USN-6873-2 USN-6874-1 USN-6892-1 USN-6896-1 USN-6900-1 USN-6919-1 USN-6927-1 View more
-
Ubuntu: USN-6733-1 (CVE-2024-28835): GnuTLS vulnerabilities
Ubuntu: USN-6733-1 (CVE-2024-28835): GnuTLS vulnerabilities Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 03/21/2024 Created 04/16/2024 Added 04/16/2024 Modified 10/23/2024 Description A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the "certtool --verify-chain" command. Solution(s) ubuntu-upgrade-libgnutls30 References https://attackerkb.com/topics/cve-2024-28835 CVE - 2024-28835 USN-6733-1
-
Huawei EulerOS: CVE-2024-29018: docker-engine security update
Huawei EulerOS: CVE-2024-29018: docker-engine security update Severity 4 CVSS (AV:L/AC:M/Au:N/C:P/I:P/A:P) Published 03/20/2024 Created 07/17/2024 Added 07/17/2024 Modified 07/17/2024 Description Moby is an open source container framework that is a key component of Docker Engine, Docker Desktop, and other distributions of container tooling or runtimes. Moby's networking implementation allows for many networks, each with their own IP address range and gateway, to be defined. This feature is frequently referred to as custom networks, as each network can have a different driver, set of parameters and thus behaviors. When creating a network, the `--internal` flag is used to designate a network as _internal_. The `internal` attribute in a docker-compose.yml file may also be used to mark a network _internal_, and other API clients may specify the `internal` parameter as well. When containers with networking are created, they are assigned unique network interfaces and IP addresses. The host serves as a router for non-internal networks, with a gateway IP that provides SNAT/DNAT to/from container IPs. Containers on an internal network may communicate between each other, but are precluded from communicating with any networks the host has access to (LAN or WAN) as no default route is configured, and firewall rules are set up to drop all outgoing traffic. Communication with the gateway IP address (and thus appropriately configured host services) is possible, and the host may communicate with any container IP directly. In addition to configuring the Linux kernel's various networking features to enable container networking, `dockerd` directly provides some services to container networks. Principal among these is serving as a resolver, enabling service discovery, and resolution of names from an upstream resolver. When a DNS request for a name that does not correspond to a container is received, the request is forwarded to the configured upstream resolver. This request is made from the container's network namespace: the level of access and routing of traffic is the same as if the request was made by the container itself. As a consequence of this design, containers solely attached to an internal network will be unable to resolve names using the upstream resolver, as the container itself is unable to communicate with that nameserver. Only the names of containers also attached to the internal network are able to be resolved. Many systems run a local forwarding DNS resolver. As the host and any containers have separate loopback devices, a consequence of the design described above is that containers are unable to resolve names from the host's configured resolver, as they cannot reach these addresses on the host loopback device. To bridge this gap, and to allow containers to properly resolve names even when a local forwarding resolver is used on a loopback address, `dockerd` detects this scenario and instead forward DNS requests from the host namework namespace. The loopback resolver then forwards the requests to its configured upstream resolvers, as expected. Because `dockerd` forwards DNS requests to the host loopback device, bypassing the container network namespace's normal routing semantics entirely, internal networks can unexpectedly forward DNS requests to an external nameserver. By registering a domain for which they control the authoritative nameservers, an attacker could arrange for a compromised container to exfiltrate data by encoding it in DNS queries that will eventually be answered by their nameservers. Docker Desktop is not affected, as Docker Desktop always runs an internal resolver on a RFC 1918 address. Moby releases 26.0.0, 25.0.4, and 23.0.11 are patched to prevent forwarding any DNS requests from internal networks. As a workaround, run containers intended to be solely attached to internal networks with a custom upstream address, which will force all upstream DNS queries to be resolved from the container's network namespace. Solution(s) huawei-euleros-2_0_sp9-upgrade-docker-engine huawei-euleros-2_0_sp9-upgrade-docker-engine-selinux References https://attackerkb.com/topics/cve-2024-29018 CVE - 2024-29018 EulerOS-SA-2024-1955
-
Microsoft Edge Chromium: CVE-2024-2631 Inappropriate implementation in iOS
Microsoft Edge Chromium: CVE-2024-2631 Inappropriate implementation in iOS Severity 4 CVSS (AV:N/AC:M/Au:N/C:N/I:P/A:N) Published 03/20/2024 Created 03/25/2024 Added 03/25/2024 Modified 01/28/2025 Description Inappropriate implementation in iOS in Google Chrome prior to 123.0.6312.58 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low) Solution(s) microsoft-edge-upgrade-latest References https://attackerkb.com/topics/cve-2024-2631 CVE - 2024-2631 https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-2631